Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Forensics: Key Concepts and Definitions, Exams of Computer Science

A concise overview of fundamental concepts in computer forensics, including definitions of key terms such as cybercrime, forensic readiness, and steganography. It also outlines essential tools and techniques used in digital investigations, such as bit-stream copies, chain of custody, and drive spy. Valuable for students and professionals seeking a foundational understanding of computer forensics.

Typology: Exams

2024/2025

Available from 12/26/2024

tizian-kylan
tizian-kylan 🇺🇸

2.7

(21)

3.7K documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CHFI 1 Questions and Answers 100%
Solved
Computer forensics ✔✔The preservation, identification, extraction, interpretation, and
documentation of computer evidence, to include the rules of evidence, legal processes, integrity
of evidence, factual reporting of the information found, and providing expert opinion in a court
of law or other legal and/or administrative proceeding as to what was found.
Cyber Crime ✔✔Any illegal act that involves a computer, its systesm, or its applications.
Enterprise Theory of Invetigation (ETI) ✔✔A methodology of investigating a criminal activity
that uses a holistic approach and looks at any criminal activity as a piece of a criminal operation
rather than as a single criminal act.
Forensic Investigator ✔✔An investigator who helps organizations and law enforcement agencies
in investigating cyber crimes and prosecuting the perpetrators of those crimes.
Forensic Readiness ✔✔An organzation's ability to make optimal use of digital evidence in a
limited period of time and ith minimal investigation costs; the technical and nontechnical actions
that maximize an organization's capability to use digital evidence.
pf3
pf4
pf5

Partial preview of the text

Download Computer Forensics: Key Concepts and Definitions and more Exams Computer Science in PDF only on Docsity!

CHFI 1 Questions and Answers 100%

Solved

Computer forensics ✔✔The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.

Cyber Crime ✔✔Any illegal act that involves a computer, its systesm, or its applications.

Enterprise Theory of Invetigation (ETI) ✔✔A methodology of investigating a criminal activity that uses a holistic approach and looks at any criminal activity as a piece of a criminal operation rather than as a single criminal act.

Forensic Investigator ✔✔An investigator who helps organizations and law enforcement agencies in investigating cyber crimes and prosecuting the perpetrators of those crimes.

Forensic Readiness ✔✔An organzation's ability to make optimal use of digital evidence in a limited period of time and ith minimal investigation costs; the technical and nontechnical actions that maximize an organization's capability to use digital evidence.

Forensic Science ✔✔The application of physical sciences to law in the search for truth in civil, criminal, and social behavioral matters for the purpose of ensuring injustice shall not be done to any members of society.

Amperage ✔✔A measurement of the amount of electric current.

Bandwidth ✔✔The width of the range of frequencies that an electronic signal uses on a given transmission medium.

Bookrack ✔✔A small shelf that is used in a forensic lab to hold reference materials.

Business Case ✔✔The justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility.

Configuration Management ✔✔the process of keeping track of all changes made to hardware, software, and firmware throughout the life of a system; source code management and revision control are part of this.

DriveSpy ✔✔A disk-forensic DOS tool that is designed to emulate and extend the capabilities of DOS to meet forensic needs; it creates a direct diesk-to-disk forensic duplicates, can copy a range of sectors within or between drives, and can process duplicate drives.

File Slack ✔✔The space that exists btween the end of a file and the end of the last cluster of the file; see also slack space.

Host-Protected Area (HPA) ✔✔An area of the drive where a certain portaion of the drive's contents is hidden from the operating system and file system.

Incident ✔✔An event or series of events that threatens the security of computing systems and networks in an organization.

Internet Service Provider (ISP) ✔✔A company that provides individuals and other companies access to the Internet and other related services, such as Web site building and virtual hosting.

Search Warrant ✔✔A written order issued by a judge that directs a law enforcement officer to search a specific area for a particular piece of evidence.

Slack Space ✔✔The space that exists between the end of a file and the end of the clast cluster of the file; see also file slack.

Steganography ✔✔The art and science of hiding information by embedding messages in other, semmingly harmless messages.

Warning Banner ✔✔A message that user is shown either prior to signing on to a system or immediately thereafter in which the uer's responsibilities are detailed and warning messages about monitoring activities are relayed.

360-Degree Photographs ✔✔Overlapping photographs showing the entire crime scene.

Volatility ✔✔The measure of how perishable electronically stored data are.

Social Engeineering ✔✔A technique used to make a person reveal confidential information usch as passwords through manipulation.

Testimonial Evidence ✔✔Oral evicdnec,e presented by a competent eyewitness to the incident, that is relevant and material to the case.